A TWO-STEP AUTHENTICATION FACIAL RECOGNITION SYSTEM FOR AUTOMATED ATTENDANCE TRACKING
Abstract
This study addresses the need for efficient, automated attendance systems through the design of a facial recognition application. Manual attendance systems are slow, error-prone and the retrieval of old records can be tedious. Universally assessable technological developments such as facial recognition software can easily solve these problems. However, the vast amount of computational resources required for its implementation has posed a limitation to its wide adoption. This study presents a two-step approach to resolve these challenges. By leveraging a faster, less-powerful model, as the first step, the workload of facial recognition can be distributed to save time and computational cost. A more powerful machine learning model is applied as the second step, deployed for tasks that are too complex for the first model to handle. The two-step authentication process will also reduce the occurrences of false negatives. Face_recognition, a python library is used for detection and encoding of face images read using python’s opencv library from an IP webcam. A flask application demonstrates this facial recognition functionality. The database connection and communication are accomplished using flask_sqlalchemy. A graphical user interface (web application) is used to interact with users on a high level, showing saved images of logged personnel and their times of entry. The system has a maximum accuracy of 98.78% and precision of 98.82% from tests. This shows its potential for application on a wider scale, with some added improvements such as cloud deployment and larger datasets.
References
Adjabi, I., Ouahabi, A., Benzaoui, A. and Taleb-Ahmed, A., (2020) Past, present, and future of face recognition: A review. Electronics, 9(8), p.1188. DOI: https://doi.org/10.3390/electronics9081188
Barney, N. (n.d.). Face detection. SearchEnterpriseAI. Retrieved from https://www.techtarget.com/searchenterpriseai/definition/face-detection.
DeepInsight. 2024. InsightFace. GitHub repository. Available at: https://github.com/deepinsight/insightface.
Faruqe, M. O., & Hasan, M. A. M. (2009, August). Face recognition using PCA and SVM. In 2009 3rd international conference on anti-counterfeiting, security, and identification in communication (pp. 97-101). IEEE. DOI: https://doi.org/10.1109/ICASID.2009.5276938
Google Cloud. (n.d.). What is artificial intelligence? Google Cloud. https://cloud.google.com/learn/what-is-artificial-intelligence.
Isaac, S., Ayodeji, D. K., Luqman, Y., Karma, S. M., & Aminu, J. (2024). CYBER SECURITY ATTACK DETECTION MODEL USING SEMI-SUPERVISED LEARNING. FUDMA JOURNAL OF SCIENCES, 8(2), 92-100. DOI: https://doi.org/10.33003/fjs-2024-0802-2343
Jayaswal, R., & Dixit, M. (2020, April). Comparative analysis of human face recognition by traditional methods and deep learning in real-time environment. In 2020 IEEE 9th international conference on communication systems and network technologies (CSNT) (pp. 66-71). IEEE. DOI: https://doi.org/10.1109/CSNT48778.2020.9115779
Kaspersky. (n.d.). What is facial recognition? Kaspersky. Retrieved November 6, 2024, from https://www.kaspersky.com/resource-center/definitions/what-is-facial-recognition.
Khairuddin, M. H., Shahbudin, S., & Kassim, M. (2021). A smart building security system with intelligent face detection and recognition. In IOP conference series: Materials science and engineering (Vol. 1176, No. 1, p. 012030). IOP Publishing. DOI: https://doi.org/10.1088/1757-899X/1176/1/012030
Kortli Y., Jridi M., Al Falou A., & Atri M. (2020). Face Recognition Systems: A Survey. Sensors, 20(2), 342. https://doi.org/10.3390/s20020342. DOI: https://doi.org/10.3390/s20020342
Lin, S. H. (2000). An introduction to face recognition technology. Informing Sci. Int. J. an Emerg. Transdiscipl., 3, 1-7. DOI: https://doi.org/10.28945/569
Milossi, M. (2021). Remote biometric identification systems and ethical challenges: The case of facial recognition. In 2021 6th South-East Europe Design Automation, Computer Engineering, Computer Networks and Social Media Conference (SEEDA-CECNSM) (pp. 1-6). IEEE.Paper 12. DOI: https://doi.org/10.1109/SEEDA-CECNSM53056.2021.9566226
Porter, G., & Doran, G. (2000). An anatomical and photographic technique for forensic facial identification. Forensic Science International, 114(2), 97-105. https://doi.org/10.1016/S0379-0738(00)00290-5. DOI: https://doi.org/10.1016/S0379-0738(00)00290-5
Copyright (c) 2024 FUDMA JOURNAL OF SCIENCES
This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences